Welcome!

@CloudExpo Authors: Stefana Muller, Pat Romanski, Karthick Viswanathan, Elizabeth White, Zakia Bouachraoui

Related Topics: @CloudExpo, Mobile IoT, Microservices Expo, Linux Containers, Containers Expo Blog, Agile Computing

@CloudExpo: Article

IronKey Morphs into Marble Cloud

Marble is meant to protect employee-owned iOS, Android, Windows and Linux mobile devices and desktop/laptop platforms

IronKey, the seven-year-old Internet security and privacy house, has changed its name to Marble Cloud in celebration of the introduction its new cloud security service.

Marble is meant to protect employee-owned iOS, Android, Windows and Linux mobile devices and desktop/laptop platforms.

The company says any user - contractor, remote worker, customer or supply chain partner - can securely access enterprise-provisioned public and private clouds from anywhere, on any of their own devices.

It's a hardened multi-layer environment that's supposed to be invulnerable - repeat, invulnerable - to Trojans, man-in-the-middle, man-in-the-browser, malevolent Wi-Fi networks, DNS poisoning and other state-of-the-threat attacks.

Being a toughie explains its less-than-fluffy new name.

Marble founder and CTO Dave Jevans says, "Internet and cloud security is fundamentally broken, and you don't need to look past the daily headlines about hackers' latest successes to know it."

Marble starts with the assumption that the endpoint and network connection are compromised.

IronKey originally got started on a grant from Homeland Security and subsequently did a lot of business with the US government.

The IronKey brand has just been turned over to Imation, which last year acquired the IronKey secure mobile storage business and products.

Jervans says, "IronKey is an extremely well-known brand in the security space, but it is very tightly tied to secure data storage; that identity now fits Imation's business better than ours. Today's name change marks an exciting new era and will help us to distinguish between our roots as the creators of the world's most secure storage and our future as the world's most secure way to surf the web and access cloud services, the brand identity we will build for Marble Cloud."

Marble, like iron, is a durable, hard object that lasts and lasts and, remembering his boyhood, Jervans explains that "marbles can contain internal secrets, like cats' eyes - or logins and secure documents - and keep them safe inside a hard shell - or a cryptographic container. You can carry marbles around in your pocket - or your smart phone, tablet or laptop - knowing they are ready to use yet secure. "

So then, Marble's cloud access management widgetry is supposed to secure BYOD and cloud services from any device, reducing costs, risks and complexity in today's extended IT infrastructures.

The solution is a combination of a Marble App, Marble Network and Marble Cloud management service. The company says it's nothing like detect-and-patch countermeasures such as antivirus, firewall and other signature-based solutions that remain vulnerable to zero-day attacks.

Employees and consultants can download and install the Marble App from anywhere. It's self-configuring based on policies defined by the enterprise on the Marble Cloud management service. The app is hardened and isolated from malware and keystroke loggers, which is said to be the safest way to access cloud services from any device.

The Marble Network is an on-the-go VPN service that encrypts all cloud access on any Wi-Fi hotspot in the world. Secure DNS with real-time blacklists prevents users from visiting phishing, malware distribution and other fraudulent web sites.

IT administrators use the Marble Cloud management service to define policies across PC and mobile device platforms for cloud access control, endpoint security, VPN configuration, cloud access whitelists, malware scanning and jailbreak detection.

A risk dashboard offers the admin full visibility and control including employee and consultant use of the system.

Marble Cloud will provide the widgetry to enterprises, banks and government agencies. It's supposed to protect users from malware on their own device and prevent data loss so companies feel safe enough from criminals, hactivists and malevolent nation-states to capitalize on cloud computing. It's also supposed to eliminate endpoint hardware and management costs.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully been able to harness the excess capacity of privately owned vehicles and turned into a meaningful business. This concept can be step-functioned to harnessing the spare compute capacity of smartphones that can be orchestrated by MEC to provide cloud service at the edge.
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addressed the challenges of scaling document repositories to this level; architectural approaches for coordinating data; search and storage technologies, Solr, and Amazon storage and database technologies; the breadth of use cases that modern content systems need to support; how to support user applications that require subsecond response times.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the public cloud best suits your organization, and what the future holds for operations and infrastructure engineers in a post-container world. Is a serverless world inevitable?